Analysis of Application Requirements of Networked Access Control in Banks

With the continuous development of the financial industry and the increasingly fierce competition in the financial market, the management of banks is becoming more and more standardized. Banks are the direct institutions for the circulation of currencies, gold, and credit capital, and safety is a top priority. As a high security site, the main appeal for the access control system is reflected in the stability, reliability, and security of the access control equipment. It also puts forward higher requirements for the technological advancement of the product. More bank users are actively focusing on access control products and applying new access control technologies. There are also numerous domestic banks and Anjin financial institutions that have chosen advanced access control products such as fingerprint access control and finger vein access using biometric identification technology, and have used scientific access control management experience to ensure operational safety.

The traditional security access control has been far from meeting the current development needs of the banking industry. It requires a larger and higher platform to focus on integrated management and control. The integration of access control systems and banking business management requires access manufacturers to provide high-capacity, high-reliability, distributed control, and centralized management products, a more intelligent and more secure system platform, and deeper integration of access control systems through the platform. Meet the needs of the market.

Networked access control systems gradually replaced traditional access control with the advantages of application security and convenient management, becoming the mainstream of development. The networked access control system is superior to the traditional access control in terms of controller security protection level, humanization of the reader, linkage intelligence level, network bandwidth, transmission speed, etc. The system software also has stronger comprehensive ability and can cross platforms. , cross-regional management. This article takes the world's leading security product and industry solution provider Hikvision as an example to discuss several applications of networked access control in banks.

First, the actual needs of the bank office building access control

1. Management of exits and entrances of office buildings

Only people holding office building work cards can enter the building and use fast personnel access gates to manage. To prevent the entry of people who do not have cards and to send advertisements, promotions, etc., it is easy to maintain the working environment in the building.

2. Visitor registration

In order to maintain the working environment of the office building, visitors to this building are not permitted to enter the building's work area unless they have booked or registered visitors. If there are reservations on the Internet in advance, you can use the self-service visitor's ID card to change the card through the entrance gate. Temporary visitors, after entering personal information at the temporary visitor workstation, issue a card to enter the building. The visitor's card automatically assigns the floor access that the ladder can reach based on the company the visitor needs to visit.

Visitor and personnel channel topology:

3. Elevator Management in High-rise Office Buildings

In ultra-high-rise financial center offices, different companies and departments are distributed on different floors to prevent non-personal or non-personnel personnel from interfering with the work environment. Only staff with the employee's card can greatly develop the floor.

4. Other needs of bank office buildings

1) Implement online patrol function

The security requirements of financial center office buildings are stricter than ordinary office buildings. The integrated management of the access control of the overall financial building facilitates online patrolling of guards and increases the level of security protection. Using the reader's card access control, the guards were issued a patrol card, and the card was swiped according to the designated credit card line within the prescribed time. This is a normal patrol. There is no need to re-arrange offline patrols. Patrols are more flexible and easy to integrate into the system.

2) Attendance management function

The fabric points are set at the entrance and exit of the company's doors, and the back-end access control system is under unified management.

3) linkage function

The security management platform integrates all devices to enable access control and fire protection linkage. In the event of a fire, all access controls can be turned on to facilitate the escape of personnel. In conjunction with video, when important rooms and key areas are opened, the video is linked to the management center.

The topology is as follows:

4) Network Management

Multiple access control terminals are networked via the Internet, and only need to log in on any terminal. All data will be automatically transmitted to the access control monitoring server in the security monitoring room for use by any other terminal for identity authentication.

Personnel authorization management: It is very easy for employees to delete permission after being transferred. If the supervisor deletes or suspends the transferred employee account that needs to be prohibited from entering or leaving the access control monitoring server, the transferred employee can no longer access the specified access control immediately;

Access time authorization management: Each access control can be individually or uniformly (or through monitoring and management software) for personnel access settings for day-to-day working hours. This ensures that workers who are not allowed in and out of the working hours are Fingerprint certification can not open the access control, and it plays a role in reducing the hidden dangers in the security protection.

Release date:2014/11/21 11:33:53

C6 Based WOR

C6 high concentration waterproofing agent, applicable to all kinds of synthetic fabric waterproof finishing, high cost performance, good lifting.
Good waterproofing and lifting, strong anti-interference ability, can be used with all kinds of anti-static, stiffening resin, softener and other functional auxiliaries.

C6 water repellent, waterproof finishing, water repellent finishing, C6 triple-proof finishing agent, water repellent agent

Dymatic Chemicals, Inc. , https://www.dymachem.com